


default search action
CRITIS 2006: Samos, Greece
- Javier López:

Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers. Lecture Notes in Computer Science 4347, Springer 2006, ISBN 3-540-69083-2 - Paulo Veríssimo

, Nuno Ferreira Neves
, Miguel Correia
:
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. 1-14 - Per Mellstrand, Rune Gustavsson:

Experiment Based Validation of CIIP. 15-29 - Syed Naqvi, Philippe Massonet

, Alvaro Arenas:
Security Requirements Model for Grid Data Management Systems. 30-41 - Fabrizio Baiardi

, S. Suin, Claudio Telmon, M. Pioli:
Assessing the Risk of an Information Infrastructure Through Security Dependencies. 42-54 - Yudistira Asnar, Paolo Giorgini

:
Modelling Risk and Identifying Countermeasure in Organizations. 55-66 - Roland Rieke

:
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. 67-78 - Jose J. Gonzalez, Jose M. Sarriegi, Alazne Gurrutxaga:

A Framework for Conceptualizing Social Engineering Attacks. 79-90 - Sandro Bologna, Giovanni Di Costanzo, Eric A. M. Luiijf

, Roberto Setola
:
An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP). 91-102 - Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak:

Intelligent Network-Based Early Warning Systems. 103-111 - Urs E. Gattiker:

Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study. 112-127 - Joaquín García-Alfaro

, Sergio Castillo, Jordi Castellà-Roca
, Guillermo Navarro, Joan Borrell
:
Protection of Components Based on a Smart-Card Enhanced Security Module. 128-139 - Yvo Desmedt, Yongge Wang

, Mike Burmester:
Revisiting Colored Networks and Privacy Preserving Censorship. 140-150 - Cristina Satizábal

, Rafael Páez
, Jordi Forné
:
PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. 151-165 - Cristina Alcaraz

, Rodrigo Roman:
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. 166-178 - Efthimia Aivaloglou

, Stefanos Gritzalis
, Charalabos Skianis:
Trust Establishment in Ad Hoc and Sensor Networks. 179-194 - Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen:

Enforcing Trust in Pervasive Computing with Trusted Computing Technology. 195-209 - María Bermúdez-Edo

, Rolando Salazar-Hernández
, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro
:
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. 210-221 - Salvatore D'Antonio, Francesco Oliviero, Roberto Setola

:
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. 222-234 - Ahto Buldas

, Peeter Laud
, Jaan Priisalu
, Märt Saarepera, Jan Willemson:
Rational Choice of Security Measures Via Multi-parameter Attack Trees. 235-248 - Daniel J. Martínez-Manzano, Gabriel López Millán, Antonio Fernandez Gómez-Skarmeta

:
Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP). 249-261 - Christos Xenakis

, Lazaros F. Merakos
:
Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. 262-272 - Vassilios Stathopoulos, Panayiotis Kotzanikolaou

, Emmanouil Magkos:
A Framework for Secure and Verifiable Logging in Public Communication Networks. 273-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














